In the Linux kernel, the following vulnerability has been resolved: LoongArch: KVM: Handle the case that EIOINTC's coremap is empty EIOINTC's coremap in eiointc_update_sw_coremap() can be empty, currently we get a cpuid with -1 in this case, but we actually need 0 because it's similar as the case that cpuid >= 4. This fix an out-of-bounds access to kvm_arch::phyid_map::phys_map[].
| Version | Score | Severity | Vector String |
|---|---|---|---|
| 3.1 | 7.3 | High | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:H |
| Product | Vendor | Version |
|---|---|---|
| Linux | Linux | <1.0.0 |
| Linux | Linux | n/a |
| Linux | Linux | 6.0.4 |
| Linux | Linux | 6.0.5 |